Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ISEC |
2013-05-23 13:20 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Timed-Release Identity-Based Encryption Toru Oshikiri, Taiichi Saito (Tokyo Denki Univ.) ISEC2013-2 |
Timed-Release Encrtption(TRE) is an encryption mechanism that allows a reciever to decrypt a ciphertext only after the t... [more] |
ISEC2013-2 pp.9-13 |
IN, NS (Joint) |
2011-03-04 08:50 |
Okinawa |
Okinawa Convention Center |
Encrypted E-mail sharing system with multi-forwarding Fubuki Kubota, Taiichi Saito (Tokyo Denki Univ) NS2010-243 |
Proxy Re-Encryption scheme allows a proxy to transform a ciphertext computed with Alice's public key into one that can b... [more] |
NS2010-243 pp.445-448 |
IT, ISEC, WBS |
2010-03-04 11:40 |
Nagano |
Nagano-Engineering Campus, Shinshu University |
Construction of secure Group Identification based on Digital Signature Keisuke Saito, Taiichi Saito (Tokyo Denki Univ.) IT2009-77 ISEC2009-85 WBS2009-56 |
A conversion from a digital signature scheme to an ID-based identification scheme proposed by Kurosawa and Heng.
And th... [more] |
IT2009-77 ISEC2009-85 WBS2009-56 pp.39-43 |
WBS, IT, ISEC |
2009-03-10 16:40 |
Hokkaido |
Hakodate Mirai Univ. |
Construction of EUF-CMA-secure Digital Signatures Based on weak Identity-Based Signatures Takahiro Oshima, Taiichi Saito (Tokyo Denki Univ.) IT2008-129 ISEC2008-187 WBS2008-142 |
In 2004, Canetti, Halevi, and Katz proposed a construction of an IND-CCA-secure Public-Key Encryption (PKE) scheme from ... [more] |
IT2008-129 ISEC2008-187 WBS2008-142 pp.557-562 |
IN, NS (Joint) |
2009-03-04 10:30 |
Okinawa |
Okinawa-Zanpamisaki Royal Hotel |
A proposal of contents predelivery scheme using Timed-Release Public-Key Encryption Yoshiaki Okamoto, Taiichi Saito (Tokyo Denki Univ) IN2008-169 |
In this paper, we propose a content pre-delivery system using Timed-Release Public-Key Encryption.
In a Timed-Release P... [more] |
IN2008-169 pp.219-224 |
IN, NS (Joint) |
2009-03-04 10:50 |
Okinawa |
Okinawa-Zanpamisaki Royal Hotel |
Development of a Mail Client with Customizable SPAM Filter Urara Murofushi, Taiichi Saito (Tokyo Denki Univ.) IN2008-170 |
We have several measures against the spam mail, one of which is mail filtering technique. A filter spam occasionally fai... [more] |
IN2008-170 pp.225-230 |
IN, NS (Joint) |
2009-03-04 11:30 |
Okinawa |
Okinawa-Zanpamisaki Royal Hotel |
A proposal of new ID base identification Keisuke Saito, Taiichi Saito (Tokyo Denki Univ.) IN2008-172 |
Kurosawa and Heng proposed a transformation from digital signature scheme to identity-based(ID-based) identification sch... [more] |
IN2008-172 pp.237-241 |
NS, IN (Joint) |
2008-03-07 09:15 |
Okinawa |
Bankoku Shinryokan |
Encrypted mail sharing using Proxy Re-encryption Shusuke Suziki, Taiichi Saito (Tokyo Denki Univ) IN2007-234 |
In this papar, we propose encrypted mail sharing using Proxy Re-encryption.
Proxy Re-encryption scheme allows a proxy t... [more] |
IN2007-234 pp.449-453 |
NS, IN (Joint) |
2008-03-07 09:55 |
Okinawa |
Bankoku Shinryokan |
Visualization of SPAM filtering information Urara Murofushi, Taiichi Saito (Tokyo Denki Univ.) IN2007-236 |
E-mail is used widely by the spread of the Internet and the portable terminal. E-mail has problem that spam mail is incr... [more] |
IN2007-236 pp.461-466 |
NS, IN (Joint) |
2008-03-07 15:40 |
Okinawa |
Bankoku Shinryokan |
A method for suppressing proliferation of leaked infomation in anonymous P2P network Naoki Tanaka, Taiichi Saito (TDU) NS2007-210 |
Information leaks on anonymous P2P networks occur through PCs on which P2P file sharing software such as Winny is runnin... [more] |
NS2007-210 pp.435-440 |
SN (2nd) |
2006-01-19 15:20 |
Tokyo |
Tokyo Denki University Kanda Campus |
A system of assisting elderly people's life Yuichi Uehara, Tomohiro Uchiyama, Kei Takeuchi, Mitsuhiro Shimazaki, Tsuyoshi Suzuki, Taiichi Saito, Yoshito Tobe, Katsuto Nakajima, Ryoichi Sasaki (Tokyo Denki Univ.) |
[more] |
|
ISEC |
2004-09-17 16:30 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
On the Security of the Full-Domain Hash variant of Chaum's Undeniable Signature schemes Yoshinari Kobayashi (Chuo Univ.), Taiichi Saito (Tokyo Denki Univ.), Shigeo Tsujii (IISEC) |
[more] |
ISEC2004-75 pp.55-60 |